Your message dated Sun, 06 Jan 2008 21:32:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#457062: fixed in exiftags 1.01-0.1
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: exiftags
Severity: grave
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for exiftags.
CVE-2007-6356[0]:
| exiftags before 1.01 allows attackers to cause a denial of service
| (infinite loop) via recursive IFD references in the EXIF data in a
| JPEG image.
CVE-2007-6355[1]:
| Unspecified vulnerability in exiftags before 1.01 has
| unknown impact and attack vectors, resulting from a "field
| offset overflow," a different vulnerability than
| CVE-2007-6354.
If you fix this vulnerability please also include the CVE id
in your changelog entry.
For further information:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6356
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6355
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
pgp4LM0bVVdlu.pgp
Description: PGP signature
--- End Message ---
--- Begin Message ---
Source: exiftags
Source-Version: 1.01-0.1
We believe that the bug you reported is fixed in the latest version of
exiftags, which is due to be installed in the Debian FTP archive:
exiftags_1.01-0.1.diff.gz
to pool/main/e/exiftags/exiftags_1.01-0.1.diff.gz
exiftags_1.01-0.1.dsc
to pool/main/e/exiftags/exiftags_1.01-0.1.dsc
exiftags_1.01-0.1_i386.deb
to pool/main/e/exiftags/exiftags_1.01-0.1_i386.deb
exiftags_1.01.orig.tar.gz
to pool/main/e/exiftags/exiftags_1.01.orig.tar.gz
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Nico Golde <[EMAIL PROTECTED]> (supplier of updated exiftags package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Thu, 03 Jan 2008 20:10:57 +0100
Source: exiftags
Binary: exiftags
Architecture: source i386
Version: 1.01-0.1
Distribution: unstable
Urgency: high
Maintainer: Mike Mattice <[EMAIL PROTECTED]>
Changed-By: Nico Golde <[EMAIL PROTECTED]>
Description:
exiftags - Utility to read Exif tags from a digital camera JPEG file
Closes: 457062
Changes:
exiftags (1.01-0.1) unstable; urgency=high
.
* Non-maintainer upload by security team.
* New upstream release (Closes: #457062):
- CVE-2007-6356: exiftags before 1.01 allows attackers to cause a denial
of service (infinite loop) via recursive IFD references in the EXIF data
in a JPEG image.
- CVE-2007-6355: Unspecified vulnerability in exiftags before 1.01 has
unknown impact and attack vectors, resulting from a "field
offset overflow,"
Files:
cfe8a608a7e7cae8f110b0fbe5dd44fa 565 graphics optional exiftags_1.01-0.1.dsc
9d5bce968fdde2dc24ba49c0024dc0cc 70921 graphics optional
exiftags_1.01.orig.tar.gz
e0eb4f0d6bbac4e5009339809c7fd08b 2176 graphics optional
exiftags_1.01-0.1.diff.gz
a5e6c936949ba6f1dc9c8f7ad7a61c5b 81596 graphics optional
exiftags_1.01-0.1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFHfkh1HYflSXNkfP8RAi86AJ9droz3pig8laYcGaOW7hxq68oxaACeOB1y
SPko0twaquda8Pj5pV2NRg0=
=o2wd
-----END PGP SIGNATURE-----
--- End Message ---